Sponsored Content
Full Discussion: lockout su for 1 user
Operating Systems AIX lockout su for 1 user Post 302335116 by homeyjoe on Friday 17th of July 2009 09:25:16 AM
Old 07-17-2009
Look at /etc/security/users - Search for 'sugroups' and change the user you want to deny into a different group.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Lockout Users

I am using AIx 4.3.3 and was wondering what the command was to keep users from logging in. I want to be able to do maintenance and keep the users out. Can anyone help? (7 Replies)
Discussion started by: cgillett
7 Replies

2. UNIX for Dummies Questions & Answers

root lockout

Hi, I am extremely new to UNIX and was recently promoted to administer the system for a small company. Anyhow, the time came for passwords to change, and I made the huge mistake of entering in the command (as root) passwd -l After logging out (oblivious to what would happen next), the root... (4 Replies)
Discussion started by: newbieadmin
4 Replies

3. AIX

user lockout...

Hi, We are using 4.3.3.0 and I would like to make a global change to the "number of failed logins before user account is locked" Any ideas, other than using SMIT one user at a time.... ??? Thanks... Craig. (2 Replies)
Discussion started by: stumpy
2 Replies

4. Red Hat

Account lockout policy

Hi all; I m using Red Hat Enterprise Linux Server release 5.1 (Tikanga) and I'm trying to setup password lockout policy so that a user account locks out after 3 failed attempts. Here are the entires of my /etc/pam.d/system-auth #%PAM-1.0 # This file is auto-generated. # User changes... (1 Reply)
Discussion started by: maverick_here
1 Replies

5. UNIX and Linux Applications

Account lockout using Openldap

What is the best way to implement account lockout in openldap? I have an openldap server with Ubuntu desktop client connecting to it for authentication. I want he accounts to locked out after say 5 failed authentication attempts I have enabled ppolicy layout in slapd.conf. overlay ppolicy... (0 Replies)
Discussion started by: nitin09
0 Replies

6. Red Hat

Account Lockout on Redhat

On a redhat linux 4 server, how to find if there is an account lockout duration is set. Is it configured under pam or /etc/shadow? what entries I need to find out? Is it pam_time.so module? I desperately need an answer because on one of the servers, no one was able to login through any account... (4 Replies)
Discussion started by: Tirmazi
4 Replies

7. Red Hat

Account lockout

having account lockout issues with an RHEL 5 server. My users are getting locked out for 10 minutes after one failed login attempt even though /etc/pam.d/sshd is configured for 5 failed attempts: auth include system-auth auth required pam_tally2.so deny=5 onerr=fail... (1 Reply)
Discussion started by: nerdalert
1 Replies

8. Solaris

Secman lockout

Greetings, I work with a Solaris Sun Server V240 system (GCCS) and have run into a problem where I can't seem to unlock my SECMAN account at the NON-GLOBAL level. I have access to all global accounts to include sysadmin and secman. I have access to the non-global sysadmin account and root... (4 Replies)
Discussion started by: TLAMGUY
4 Replies

9. Red Hat

RHEL4.8 no notification on PAM lockout

Good day. I have setup hardening the password (test system so far) prior to doing any work on production. Here is what I have set. Snippet from /etc/pam.d/system-auth auth required /lib/security/$ISA/pam_env.so auth required /lib/security/$ISA/pam_tally.so... (3 Replies)
Discussion started by: smurphy_it
3 Replies
pmvarrun(8)							     pam_mount							       pmvarrun(8)

Name
       pmvarrun - updates /var/run/pam_mount/user

Syntax
       pmvarrun -u user [options]

Description
       A  separate  program is needed so that /var/run/pam_mount/user may be created with a pam_mount-specific security context (otherwise SELinux
       policy will conflict with gdm, which also creates file in /var/run).

       pmvarrun is flexible and can run in a number of different security setups:

   root-root
       When pmvarrun is invoked as root, /var/run/pam_mount's permission settings can be as strict as needed; usually (0755,root,root) is  a  good
       pick  as  it  gives  users the debug control over their refcount. Refcount files are given their respective owners (chowned to the user who
       logs in).

   user-user
       When invoked as the user who logs in, /var/run/pam_mount needs appropriate permissions to create a file, which means the write bit must	be
       set. It is also highly suggested to set the sticky bit in this case, so other users do not tamper with your refcount.

   root-user
       Some  programs or login helpers incorrectly call the PAM stack in a way that the login phase is done as root and the logout phase as a nor-
       mal user.  Nevertheless, pmvarrun supports this, and the same permissions as in root-root can be used. While the user may not  be  able	to
       unlink his file from /var/run/pam_mount, it will be truncated to indicate the same state.

Options
       --help, -h
	      Display help.

       --user user, -u user
	      User to handle, must be a valid username.

       --operation number, -o number
	      Increase volume count by number.

       -d     Turn on debugging.

Files
       /var/run/pam_mount/user

Author
       This  manpage  was originally written by Bastian Kleineidam <calvin@debian.org> for the Debian distribution of libpam-mount but may be used
       by others.

       See /usr/share/doc/packages/libpam-mount/copyright for the list of original authors of pam_mount.

pam_mount							    2008-10-08							       pmvarrun(8)
All times are GMT -4. The time now is 04:05 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy